Organized cyber-crime can come up with some pretty nasty attacks, but nation-states can pour vastly more resources into developing cyber-weapons. Is there any defense against government-sponsored malware? Read More »

Security researchers have dissected and analyzed the mobile components of commercial spyware used by governments around the world which can be used to surreptitiously record and steal data from mobile devices. Read More »

Your employees need to recognize phishing attacks and avoid them. One way to train them is to send your own fraudulent mail, but you had better be very, very sure you know what you're doing. Read More »

F-Secure's Threat Report for the second half of 2013 is packed with approachable articles. One of them tackles the possibility that security companies might be pressured to whitelist government-sanctioned malware. Read More »

The Federal Election Commission was hit by a massive cyberattack hours after the government shutdown, according to a report from the Center for Public Integrity. The CPI report claimed the Chinese were behind "the worst act of sabotage" in the agency's history. Read More »

The disclosures from the Snowden files keep on coming, with each revelation more disturbing than the last. The latest report reveals a plan by the National Security Agency to collected information on six people's online activity, particularly their visits to pornographic websites, to discredit them within their community. Read More »

In the wake of revelations about the National Security Agency's domestic surveillance programs over American phone records and Internet activities, Congressional leaders are demanding reform to rein in the agency's broad powers. How far will Congress go? Read More »

From a legal standpoint, it appears PRISM is not illegal—the NSA has not broken any laws. The question remains, however, whether or not the government should be collecting information—even metadata—about what people are doing online. Should PRISM be allowed to exist? Read More »

If you've been following every twist in the saga of Edward Snowden and the National Security Agency's surveillance program, then you already know that he claims to have evidence the United States have been hacking China since 2009. Read More »

Suddenly, everyone wants to know how to send encrypted text messages, to surf the Web without anyone being able to trace their online activities, and to store files that couldn't be accessed by anyone else. Previously, when I said each person has to secure their online activity, I was accused of being paranoid. Read More »

If the revelations that Verizon (and perhaps other telcomms) is handing over customer call records to the federal government has you scrambling for your tinfoil hat, there is a simple way to make sure those government spies have no idea who you are calling. Read More »

Automatic Renewal Program: Your subscription will continue without interruption for as long as you wish, unless
you instruct us otherwise. Your subscription will automatically renew at the end of the term unless you authorize
cancellation. Each year, you'll receive a notice and you authorize that your credit/debit card will be charged the
annual subscription rate(s). You may cancel at any time during your subscription and receive a full refund on all
unsent issues. If your credit/debit card or other billing method can not be charged, we will bill you directly instead. Contact Customer Service

//Stay Connected

Get Product Reviews, Deals, & the Latest News from PCMag

sign up

Plus, get a free copy of PCMag for your iPhone or iPad today.

Offer valid for new PCMag app downloads only. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy.

THANK YOU FOR SUBSCRIBING!

Please follow this link (or search for the PC Magazine app on your iPad or iPhone) to get your free issue. Offer valid for new app downloads.